CFP last date
20 December 2024
Reseach Article

Transmission and Authentication of Text Messages through Image Steganography

Published on January 2014 by Pragya Agarwal, Shilpi Gupta, Anu Mehra
International IT Summit Confluence 2013-The Next Generation Information Technology Summit
Foundation of Computer Science USA
CONFLUENCE2013 - Number 2
January 2014
Authors: Pragya Agarwal, Shilpi Gupta, Anu Mehra
08e5f854-3a22-4906-94d4-20fa7183e860

Pragya Agarwal, Shilpi Gupta, Anu Mehra . Transmission and Authentication of Text Messages through Image Steganography. International IT Summit Confluence 2013-The Next Generation Information Technology Summit. CONFLUENCE2013, 2 (January 2014), 16-20.

@article{
author = { Pragya Agarwal, Shilpi Gupta, Anu Mehra },
title = { Transmission and Authentication of Text Messages through Image Steganography },
journal = { International IT Summit Confluence 2013-The Next Generation Information Technology Summit },
issue_date = { January 2014 },
volume = { CONFLUENCE2013 },
number = { 2 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 16-20 },
numpages = 5,
url = { /proceedings/confluence2013/number2/15120-1312/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International IT Summit Confluence 2013-The Next Generation Information Technology Summit
%A Pragya Agarwal
%A Shilpi Gupta
%A Anu Mehra
%T Transmission and Authentication of Text Messages through Image Steganography
%J International IT Summit Confluence 2013-The Next Generation Information Technology Summit
%@ 0975-8887
%V CONFLUENCE2013
%N 2
%P 16-20
%D 2014
%I International Journal of Computer Applications
Abstract

The demand for effective information security schemes is increasing day by day, with the exponential growth and use of Internet. Cryptography and Steganography are two popular techniques, which are to be used for effective secret communications. . In this paper I have proposed a scheme, which can encode a text message and transmit it safely to its destination. Moreover the receiver can authenticate the received message to ensure that any intruder has not altered the original message. To facilitate the authentication facility, a hash code will be generated by the original message, which will be sent to the receiver securely. The hash code will be sent to receiver by hiding it into an image using image steganography. The receiver will decrypt the cipher text message to get the plaintext message. After that receiver will calculate the hash code with the received message and will compare this, with the received hash code. If both the hash codes are equal, it means that the received message is the original message. For generating the hash code, I have used SHA-1 method, and also analysed its performance and compared with that of MD5 method.

References
  1. Sadaquat Ur Rehman, Mohammad Bilal, Basharat Ahmad, Khawaja Muhammad Yahya, Anees Ullah, Obaid Ur Rehman "Comparison based analysis of Different Cryptographic and Encryption Techniques using Message Authentication Code (MAC) in wireless sensor networks (WSN), International Journal of Computer Science issues 2012.
  2. Dinesh Dasarathan, "Analysis of Timing variability for Encryption Algorithms for the Atmega Platform", a project proposal for Real Time Operating System.
  3. Michael Sjydlo, Yiqun Lisa Yin, "Collision Resistant Usage of MD5 and SHA1 via message preprocessing", The Cryptographer's Track at RSA Conference - CT-RSA, pp. 99-114, 2006.
  4. X. Wang and Y. L. Yin, and H. Yu, "Finding collisions in full SHA1" in Advances of Cryptology-Crypto'05, Springer-Verlag, 2005.
  5. X. Wang, A Yao, F. Yao, "New collision search for SHA1", Rump Session Crypto'05.
  6. Kalavathi Alla, G. Gowri Shankar, G. Bala Subrahmanyam, "Secure Transmission of Authenticated Messages using new encoding scheme and steganography", CCSEIT-12, ACM , October 26-28, 2012, Coimbatore, Tamilnadu, India.
  7. A. Joseph Raphael, Dr. V. Sundaram," Cryptography and Steganography- A Survey", International journal of computational technology and Applications, vol. 2, p. p. 626-630, June, 2011.
  8. Soumik Das, Pradosh Bandyopadhyay, Prof. Atal Chaudhary, Dr. Monalisa Banerjee, "A Secure key based Digital Text Passing System through color Image Pixels", IEEE International conference on Advances in Engineering, Science and Management (ICAESM-2012), p. p. 978-981, March 30,31, 2012.
  9. Fahim Irfan Alam, Fateha Khanam Bappee, Farid Uddin Ahmed Khondker, "An Investigation into Encrypted Message Hiding Through Images Using LSB", International Journal of Engineering Science and Technology (IJEST) vol 3, Feb 2011.
  10. Shamim Ahmed Laskar and Kattamanchi Hemachandran, " Secure Data Transmission using Steganography and Encryption Technique", International journal on Cryptography and Information Security (IJCIS), vol 2, September 2012.
  11. H. E. Michail, A. P. Kakarountas, A. Milidonis, C. E. Goutis, " Efficient Implementation of the keyed hash message authentication code (HMAC) using the SHA-1 Hash Function", IEEE, May, 2004.
  12. Hiroyuki Kobayashi, Hitoshi Kiya, " Robust Image Authentication using Hash Function", IEEE, Aug, 2004.
  13. M. Zeghid, B. Bouallegue, A. Baganne, M. Machhout, R. Tourki, " A Reconfigurable Implementation of the new Secure Hash Algorithm", Second International Conference on Availability, Reliability and Security (ARES 07), IEEE, Feb, 2007.
  14. J. K. Mandal, Madhumita Sen Gupta," Authentication/Secret Message Transformation through Wavelet Transform based Subband Image Coding (WTSIC)", Internatianal Symposium on Electronic System Design, IEEE, Feb, 2010.
  15. Debnath Bhattacharyya, Jhuma Dutta, Poulami das, S. K. Bandyopadhyay, Tai hoon Kim," Discrete Cosine Transformation based Authentication and secret Message Transmission Scheme", First International conference on Computational Intelligence, Communication Systems and Networks, IEEE, June, 2009.
  16. Cheng Xiao hui, Deng Jian zhi, "Design of SHA-1 Algorithm based on FPGA", Second International conference on Networks Security, Wireless Communications and Trusted Computing, IEEE, May, 2010.
  17. Sachin Tripathi, G. P. Biswas, Sumitra Kisan, " Cryptographic Keys Generation using Identity", Proc. Of Int. conference on Advances in Recent Technologies in communication and computing, IET, 2011.
  18. S. S. Manvi, M. S. Kakkasageri, D. G. Adiga, " Message Authentication in vehicular Ad hoc Networks: ECDSA based Approach", International conference on Future Computer Communication, IEEE, March, 2009.
  19. Hung Yu Chien, " Forgery Attacks on Digital Signature Schemes without using One way Hash and Message Redundancy", IEEE Communications Letters, vol. 10, May, 2006.
  20. Andhe Dharani, P. S. Satyanarayana, Andhe Pallavi, " Analysis of Message Authentication in Turbo Coded Halftoned Images using Exit Charts", World Academy of Science, Engineering and Technology, 2007.
  21. Ms. B. Veera Jyothi, Dr. S. M. Verma, Dr. C. Uma Shanker,"Implementation and Analysis of Email Messages Encryption and Image Steganography Schemes for Image Authentication and Verification", International Journal of Computer Applications, vol. 5, August, 2010.
  22. Babloo Saha, Shuchi Sharma," Steganographic Techniques of Data Hiding using Digital Images", Defence Science Journal, vol 62, p. p. 11-18, January 2012. Defence Science Journal, vol 62, p. p. 11-18, January 2012.
  23. Rosziati Ibrahim, Teoh Suk Kuan, " Steganography Algorithm to Hide Secret Message inside an image", Computer Technology and Application, p. p. 102-108, 2011.
  24. T. Morkel, J. H. P. Eloff, M. S. Olivier, " An Overview of Image Steganography", Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA), July 2005.
  25. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Osamah M. Al-Qershi, "Image Steganography Techniques :an Overview'', International Journal of Computer Science and Security(IJCSS), vol 6, 2012.
  26. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, "Digital Image Steganography: Survey and Analysis of Current Methods", Signal Processing, vol. 90, issue 3, p. p. 727-752, march 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography Authentication Hash Functions Information Security.